NCC Group Research Blog
Making New Connections – Leveraging Cisco AnyConnect Client to Drop and Run Payloads
9 months ago
Machine Learning 104: Breaking AES With Power Side-Channels
9 months ago
Machine Learning for Static Analysis of Malware – Expansion of Research Scope
9 months ago
Machine Learning 103: Exploring LLM Code Generation
9 months ago
Lumension Device Control Remote Memory Corruption
9 months ago
Machine Learning 101: The Integrity of Image (Mis)Classification?
9 months ago
Machine Learning 102: Attacking Facial Authentication with Poisoned Data
9 months ago
LTair: The LTE Air Interface Tool
9 months ago
Lumension Device Control (formerly Sanctuary) remote memory corruption
9 months ago
Login Service Security
9 months ago
Logs, Logs, the Audit Trail – Features of a Successful Log Management Solution
9 months ago
Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel
9 months ago
Log4Shell: Reconnaissance and post exploitation network detection
9 months ago
Live Incident Blog: June Global Ransomware Outbreak
9 months ago
Local network compromise despite good patching
9 months ago
log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228
9 months ago
libtalloc: A GDB plugin for analysing the talloc heap
9 months ago
Lights, Camera, HACKED! An insight into the world of popular IP Cameras
9 months ago
Lessons learned from 50 USB bugs
9 months ago
Checked
2 hours 44 minutes ago